Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method for wireless mesh network

A wireless mesh network and wireless mesh network technology, applied in wireless communication, user identity/authority verification, security devices, etc., can solve problems such as two-way authentication MKD logic conflicts, avoid link establishment failures, and ensure security Effect

Inactive Publication Date: 2012-04-18
GCI SCI & TECH
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention proposes a wireless mesh network access authentication method to solve the problem of two-way authentication and MKD logic conflicts between mesh network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method for wireless mesh network
  • Access authentication method for wireless mesh network
  • Access authentication method for wireless mesh network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0031] In a specific embodiment, the second mesh network node detects the reception of the surrounding mesh network node by receiving the beacon frame of the surrounding mesh network node, or the second mesh network node sends a probe request frame Signal Strength (Received Signal Strength, RSS), so as to discover the first mesh network node that has passed the authentication, and send a first access authentication request message to the first mesh network node with the first mesh network node as the authenticator.

[0032]S12. After receiving the first access authentication request message, the first mesh network node uses a private key to encrypt the certificate of the first mesh network node and the first access authentication request message together to generate a first certificate Authentication request message, and sent to the authentication server;

[0033] S13. After receiving the first certificate authentication request message, the authentication server uses the publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method for a wireless mesh network. In the method, a second mesh network node finds out a first mesh network node passing authentication by detecting a node signal existing peripherally, takes the peer-to-peer first mesh network node as an authenticator and sends an access request to the authenticator; and the peer-to-peer authentication among Mesh equipment is realized through ternary authentication among the authenticator, a requestor and an authentication server, and the requestor accesses to Mesh through the authenticator. By adopting the embodiment of the invention, a conflict problem between bidirectional authentication between the mesh network nodes, and MKD (Mesh Key Distributor) logic can be solved.

Description

technical field [0001] The invention relates to the technical field of wireless mesh networks, in particular to an access authentication method of a wireless mesh network. Background technique [0002] Wireless Mesh network (also known as wireless mesh network) technology is a new type of wireless mobile communication technology for IP-based access, suitable for regional environmental coverage and broadband high-speed wireless access. Each node in a wireless mesh network can send and receive signals, and each node can communicate directly with one or more peer nodes. Each network node is connected in a wireless multi-hop manner through other adjacent network nodes, which can greatly increase the coverage of the wireless system. [0003] The wireless Mesh network includes four logical network devices, which are Mesh Point (MP), Mesh Access Point (MAP), and Mesh Point with a Portal , MPP) and user terminals (Station, STA). The wireless Mesh network architecture defined in 8...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/08H04L29/06H04L9/32H04W12/0431H04W12/069
Inventor 杨峰陈康先伍绍秋
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products